Zero trust, deception & disruption, change management Flashcards

1
Q

Zero trust

A

You have to authenticate or prove yourself each time you want to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can we start implementing zero trust?

A

Take our security devices & break them into smaller components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data plane

A

Part of device that processes frames, packets, network data.
Ex: switch, router firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control plane

A

Manages actions occurring in the data plane, Configuring policies & rules.
Ex: routing tables, firewall rule, NAT tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do we control trust?

A
  1. Adaptive Identity
  2. Threat scope reduction
  3. Policy-driven access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adaptive identity

A

We want to look at the source of the requested resources.
Ex: physical location, IP address, relationship to org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat scope reduction

A

decrease the # of possible entry points to get into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Policy-driven access control

A

Combines all the individual data points (adaptive identity) then decides what type of authentication to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Another way to qualify identity of a person is through-

A

Security Zones, look at where they’re coming from and where they’re going.
**set rules on what zone has access to other zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policy enforcement point (gatekeeper)

A

§ Gathers all info about traffic, then provides it to PDP.
All of traffic that’s traversing through network must pass through PEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policy decision point

A

responsible for examining the authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Policy engine

A

Evaluates each access decision based on policy.
Grant, deny, or revoke.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Policy administrator

A

○ Takes that decision and communicates w/ PEP
○ Generates access tokens or credentials
○ Tells the PEP to allow or disallow access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

Attract attackers to system, & keep them involved to trap them there.
Creates a virtual world to explore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeynets

A

A large deception network w. one or more honeypots.
Ex: servers, workstations, routers, switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeyfiles

A

bait for the honeynet
Add many honey files to file shares

17
Q

Honeytokens

A

track malicious data, add traceable data

18
Q

Change approval process includes-

A
  1. Complete the request forms
  2. Determining the purpose of the change
  3. Identify the scope of the change (single system or multiple systems)
  4. Schedule a date and time of the change
  5. Determine affected systems & impact
  6. Analyze the risk associated w/ change
19
Q

Impact analysis

A

Recognizing the risk that is involved in a particular change

20
Q

What are the risk of not making a change?

A
  1. Security vulnerability
  2. Application unavailability
  3. Unexpected downtime
21
Q

Sandbox testing environment

A

Perform as many tests as you’d like and have no effect on your production system

22
Q

Backout plan

A

strategy for reverting back to your previous system state
**Always have backups

23
Q

Maintenance window

A

Scheduled periods of time when system updates, backups, and tests are performed on applications.
**overnight best choice

24
Q

Standard operating procedure

A

Step-by-step instructions to help workers carry out routine operations.
**process must be documented

25
Q

Living document

A

policy, plan or framework that is continuously updated and revised to reflect the changing cyber landscape.

26
Q

A change approval is-

A
  1. Timely
  2. Scope of change is important
  3. Specific
27
Q

Legacy applications

A

Applications that were here before you arrived.
No longer supported by developer

28
Q

Dependencies

A

Connections between assets where the state of one relies to the other.
A service will not start w/o other active services.

29
Q

Version control

A

A software system that tracks changes to a file or configuration data over time.